Login / Signup
WOOT @ USENIX Security Symposium
2017
2020
2017
2020
Keyphrases
Publications
2020
Alex Matrosov
Hardware Security Is Hard: How Hardware Boundaries Define Platform Security.
WOOT @ USENIX Security Symposium
(2020)
Marcel Busch
,
Johannes Westphal
,
Tilo Müller
Unearthing the TrustedCore: A Critical Review on Huawei's Trusted Execution Environment.
WOOT @ USENIX Security Symposium
(2020)
14th USENIX Workshop on Offensive Technologies, WOOT 2020, August 11, 2020
WOOT @ USENIX Security Symposium
(2020)
Johannes Obermaier
,
Marc Schink
,
Kosma Moczek
One Exploit to Rule them All? On the Security of Drop-in Replacement and Counterfeit Microcontrollers.
WOOT @ USENIX Security Symposium
(2020)
Andrea Fioraldi
,
Dominik Maier
,
Heiko Eißfeldt
,
Marc Heuse
AFL++ : Combining Incremental Steps of Fuzzing Research.
WOOT @ USENIX Security Symposium
(2020)
Jörn Tillmanns
,
Jiska Classen
,
Felix Rohrbach
,
Matthias Hollick
Firmware Insider: Bluetooth Randomness is Mostly Random.
WOOT @ USENIX Security Symposium
(2020)
Dhrumil Patel
,
Aditya Basu
,
Anish Mathuria
Automatic Generation of Compact Printable Shellcodes for x86.
WOOT @ USENIX Security Symposium
(2020)
Jianliang Wu
,
Yuhong Nan
,
Vireshwar Kumar
,
Dave (Jing) Tian
,
Antonio Bianchi
,
Mathias Payer
,
Dongyan Xu
BLESA: Spoofing Attacks against Reconnections in Bluetooth Low Energy.
WOOT @ USENIX Security Symposium
(2020)
Haehyun Cho
,
Jinbum Park
,
Joonwon Kang
,
Tiffany Bao
,
Ruoyu Wang
,
Yan Shoshitaishvili
,
Adam Doupé
,
Gail-Joon Ahn
Exploiting Uses of Uninitialized Stack Variables in Linux Kernels to Leak Kernel Pointers.
WOOT @ USENIX Security Symposium
(2020)
Vanessa Teague
When Is a Proof Actually Not?
WOOT @ USENIX Security Symposium
(2020)
Nirjhar Roy
,
Nikhil Bansal
,
Gourav Takhar
,
Nikhil Mittal
,
Pramod Subramanyan
When Oblivious is Not: Attacks against OPAM.
WOOT @ USENIX Security Symposium
(2020)
Dmitrii Ustiugov
,
Plamen Petrov
,
M. R. Siavash Katebzadeh
,
Boris Grot
Bankrupt Covert Channel: Turning Network Predictability into Vulnerability.
WOOT @ USENIX Security Symposium
(2020)
Steffen Klee
,
Alexandros Roussos
,
Max Maass
,
Matthias Hollick
NFCGate: Opening the Door for NFC Security Research with a Smartphone-Based Toolkit.
WOOT @ USENIX Security Symposium
(2020)
Jens Müller
,
Fabian Ising
,
Christian Mainka
,
Vladislav Mladenov
,
Sebastian Schinzel
,
Jörg Schwenk
Office Document Security and Privacy.
WOOT @ USENIX Security Symposium
(2020)
Alex Ionescu
OS Security Is Hard: Why All the Fuzzers in the World Won't Change the Way Platform Security Is Failing Us.
WOOT @ USENIX Security Symposium
(2020)
Dennis Heinze
,
Jiska Classen
,
Matthias Hollick
ToothPicker: Apple Picking in the iOS Bluetooth Stack.
WOOT @ USENIX Security Symposium
(2020)
2019
Colin O'Flynn
MIN()imum Failure: EMFI Attacks against USB Stacks.
WOOT @ USENIX Security Symposium
(2019)
13th USENIX Workshop on Offensive Technologies, WOOT 2019, Santa Clara, CA, USA, August 12-13, 2019.
WOOT @ USENIX Security Symposium
(2019)
Jatin Kataria
,
Rick Housley
,
Joseph Pantoga
,
Ang Cui
Defeating Cisco Trust Anchor: A Case-Study of Recent Advancements in Direct FPGA Bitstream Manipulation.
WOOT @ USENIX Security Symposium
(2019)
Adar Ovadya
,
Rom Ogen
,
Yakov Mallah
,
Niv Gilboa
,
Yossi Oren
Cross-Router Covert Channels.
WOOT @ USENIX Security Symposium
(2019)
Johannes Pohl
,
Andreas Noack
Automatic Wireless Protocol Reverse Engineering.
WOOT @ USENIX Security Symposium
(2019)
Jithin Pavithran
,
Milan Patnaik
,
Chester Rebeiro
D-TIME: Distributed Threadless Independent Malware Execution for Runtime Obfuscation.
WOOT @ USENIX Security Symposium
(2019)
Marc Schink
,
Johannes Obermaier
Taking a Look into Execute-Only Memory.
WOOT @ USENIX Security Symposium
(2019)
Hanqing Zhao
,
Yanyu Zhang
,
Kun Yang
,
Taesoo Kim
Breaking Turtles All the Way Down: An Exploitation Chain to Break out of VMware ESXi.
WOOT @ USENIX Security Symposium
(2019)
Dixit Kumar
,
Chavhan Sujeet Yashavant
,
Biswabandan Panda
,
Vishal Gupta
How Sharp is SHARP ?
WOOT @ USENIX Security Symposium
(2019)
Branimir Pervan
,
Josip Knezovic
,
Katja Pericin
Distributed Password Hash Computation on Commodity Heterogeneous Programmable Platforms.
WOOT @ USENIX Security Symposium
(2019)
David Fifield
A better zip bomb.
WOOT @ USENIX Security Symposium
(2019)
Sangsup Lee
,
Daejun Kim
,
Dongkwan Kim
,
Sooel Son
,
Yongdae Kim
Who Spent My EOS? On the (In)Security of Resource Management of EOS.IO.
WOOT @ USENIX Security Symposium
(2019)
Dominik Maier
,
Benedikt Radtke
,
Bastian Harren
Unicorefuzz: On the Viability of Emulation for Kernelspace Fuzzing.
WOOT @ USENIX Security Symposium
(2019)
Andrea Mambretti
,
Alexandra Sandulescu
,
Matthias Neugschwandtner
,
Alessandro Sorniotti
,
Anil Kurmus
Two methods for exploiting speculative control flow hijacks.
WOOT @ USENIX Security Symposium
(2019)
Trishita Tiwari
,
Ari Trachtenberg
Alternative (ab)uses for HTTP Alternative Services.
WOOT @ USENIX Security Symposium
(2019)
Fabian Ullrich
,
Jiska Classen
,
Johannes Eger
,
Matthias Hollick
Vacuums in the Cloud: Analyzing Security in a Hardened IoT Ecosystem.
WOOT @ USENIX Security Symposium
(2019)
Hadrien Barral
,
Rémi Géraud-Stewart
,
Georges-Axel Jaloyan
,
David Naccache
RISC-V: #AlphanumericShellcoding.
WOOT @ USENIX Security Symposium
(2019)
2018
Robert Gawlik
,
Thorsten Holz
SoK: Make JIT-Spray Great Again.
WOOT @ USENIX Security Symposium
(2018)
Jonas Bushart
Optimizing Recurrent Pulsing Attacks using Application-Layer Amplification of Open DNS Resolvers.
WOOT @ USENIX Security Symposium
(2018)
Michael Smith
,
Craig Disselkoen
,
Shravan Narayan
,
Fraser Brown
,
Deian Stefan
Browser history re: visited.
WOOT @ USENIX Security Symposium
(2018)
Rom Ogen
,
Kfir Zvi
,
Omer Shwartz
,
Yossi Oren
Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming.
WOOT @ USENIX Security Symposium
(2018)
Esmaeil Mohammadian Koruyeh
,
Khaled N. Khasawneh
,
Chengyu Song
,
Nael B. Abu-Ghazaleh
Spectre Returns! Speculation Attacks using the Return Stack Buffer.
WOOT @ USENIX Security Symposium
(2018)
Michael Lescisin
,
Qusay H. Mahmoud
Tools for Active and Passive Network Side-Channel Detection for Web Applications.
WOOT @ USENIX Security Symposium
(2018)
Alexander Vetterl
,
Richard Clayton
Bitter Harvest: Systematically Fingerprinting Low- and Medium-interaction Honeypots at Internet Scale.
WOOT @ USENIX Security Symposium
(2018)
Stephan Kleber
,
Henning Kopp
,
Frank Kargl
NEMESYS: Network Message Syntax Reverse Engineering by Analysis of the Intrinsic Structure of Individual Messages.
WOOT @ USENIX Security Symposium
(2018)
Johannes Pohl
,
Andreas Noack
Universal Radio Hacker: A Suite for Analyzing and Attacking Stateful Wireless Protocols.
WOOT @ USENIX Security Symposium
(2018)
Mathy Vanhoef
,
Frank Piessens
Symbolic Execution of Security Protocol Implementations: Handling Cryptographic Primitives.
WOOT @ USENIX Security Symposium
(2018)
Matthias Niedermaier
,
Jan-Ole Malchow
,
Florian Fischer
,
Daniel Marzin
,
Dominik Merli
,
Volker Roth
,
Alexander von Bodisco
You Snooze, You Lose: Measuring PLC Cycle Times under Attacks.
WOOT @ USENIX Security Symposium
(2018)
Satohiro Wakabayashi
,
Seita Maruyama
,
Tatsuya Mori
,
Shigeki Goto
,
Masahiro Kinugawa
,
Yu-ichi Hayashi
A Feasibility Study of Radio-frequency Retroreflector Attack.
WOOT @ USENIX Security Symposium
(2018)
Giuseppe Garofalo
,
Vera Rimmer
,
Tim Van hamme
,
Davy Preuveneers
,
Wouter Joosen
Fishy Faces: Crafting Adversarial Images to Poison Face Authentication.
WOOT @ USENIX Security Symposium
(2018)
Aram Verstegen
,
Roel Verdult
,
Wouter Bokslag
Hitag 2 Hell - Brutally Optimizing Guess-and-Determine Attacks.
WOOT @ USENIX Security Symposium
(2018)
12th USENIX Workshop on Offensive Technologies, WOOT 2018, Baltimore, MD, USA, August 13-14, 2018.
WOOT @ USENIX Security Symposium
(2018)
Dawn Song
,
Kevin Eykholt
,
Ivan Evtimov
,
Earlence Fernandes
,
Bo Li
,
Amir Rahmati
,
Florian Tramèr
,
Atul Prakash
,
Tadayoshi Kohno
Physical Adversarial Examples for Object Detectors.
WOOT @ USENIX Security Symposium
(2018)
Julian Fietkau
,
Starbug
,
Jean-Pierre Seifert
Swipe Your Fingerprints! How Biometric Authentication Simplifies Payment, Access and Identity Fraud.
WOOT @ USENIX Security Symposium
(2018)